TY - JOUR
T1 - Developing a typological theory using a quantitative approach
T2 - A case of information security deviant behavior
AU - Chu, Amanda M.Y.
AU - Chau, Patrick Y.K.
AU - So, Mike K.P.
N1 - Publisher Copyright:
© 2015 by the Association for Information Systems.
Copyright:
Copyright 2020 Elsevier B.V., All rights reserved.
PY - 2015
Y1 - 2015
N2 - Different from classification and taxonomy, typology meets the criteria of a theory and is a unique form of theory building. Typology is a good first step in exploring a research topic, and, therefore, we are concerned with building typological theories for underdeveloped topics with limited studies. We propose a four-step approach involving content analysis, multidimensional scaling, judgmental analysis, and empirical testing to guide researchers in developing typological theories in their domains of interest using a quantitative approach that rides on empirical methods and industry wisdom. Previous research in information security has paid little attention to employees’ deviant behavior in the workplace. We, therefore, built a typology of information security deviant behavior as an example to illustrate the theory development process. We discuss the theoretical, methodological, and practical implications of this study.
AB - Different from classification and taxonomy, typology meets the criteria of a theory and is a unique form of theory building. Typology is a good first step in exploring a research topic, and, therefore, we are concerned with building typological theories for underdeveloped topics with limited studies. We propose a four-step approach involving content analysis, multidimensional scaling, judgmental analysis, and empirical testing to guide researchers in developing typological theories in their domains of interest using a quantitative approach that rides on empirical methods and industry wisdom. Previous research in information security has paid little attention to employees’ deviant behavior in the workplace. We, therefore, built a typology of information security deviant behavior as an example to illustrate the theory development process. We discuss the theoretical, methodological, and practical implications of this study.
KW - Deviant behavior
KW - Information security
KW - Multidimensional scaling
KW - Theory building
KW - Typological theory
UR - http://www.scopus.com/inward/record.url?scp=84942104848&partnerID=8YFLogxK
U2 - 10.17705/1cais.03725
DO - 10.17705/1cais.03725
M3 - Article
AN - SCOPUS:84942104848
SN - 1529-3181
VL - 37
SP - 510
EP - 535
JO - Communications of the Association for Information Systems
JF - Communications of the Association for Information Systems
M1 - 25
ER -